<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to permit only OPC protocol traffic through CISCO ASA 5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-permit-only-opc-protocol-traffic-through-cisco-asa-5505/m-p/2597590#M205290</link>
    <description>&lt;P&gt;Hello,&amp;nbsp;I have a trouble with OPC protocol&amp;nbsp; on cisco ASA 5505. I'd like to &lt;SPAN&gt;ask for help: we need to flow only OPC protocol(based on DCOM and MS RPC) through the ASA 5505 K8. Do you have any solutions? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I will be grateful for help.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 05:04:31 GMT</pubDate>
    <dc:creator>PelekhovIS</dc:creator>
    <dc:date>2019-03-12T05:04:31Z</dc:date>
    <item>
      <title>How to permit only OPC protocol traffic through CISCO ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/how-to-permit-only-opc-protocol-traffic-through-cisco-asa-5505/m-p/2597590#M205290</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;I have a trouble with OPC protocol&amp;nbsp; on cisco ASA 5505. I'd like to &lt;SPAN&gt;ask for help: we need to flow only OPC protocol(based on DCOM and MS RPC) through the ASA 5505 K8. Do you have any solutions? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I will be grateful for help.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:04:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-permit-only-opc-protocol-traffic-through-cisco-asa-5505/m-p/2597590#M205290</guid>
      <dc:creator>PelekhovIS</dc:creator>
      <dc:date>2019-03-12T05:04:31Z</dc:date>
    </item>
    <item>
      <title>Hi PelekhovlS,Could you</title>
      <link>https://community.cisco.com/t5/network-security/how-to-permit-only-opc-protocol-traffic-through-cisco-asa-5505/m-p/2597591#M205291</link>
      <description>&lt;P&gt;Hi PelekhovlS,&lt;/P&gt;&lt;P&gt;Could you please explain your problem in detail , what issue exactly you are facing with ASA so that we can guide you.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2014 13:07:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-permit-only-opc-protocol-traffic-through-cisco-asa-5505/m-p/2597591#M205291</guid>
      <dc:creator>Murali</dc:creator>
      <dc:date>2014-11-13T13:07:27Z</dc:date>
    </item>
    <item>
      <title>Hi murali438,We have server</title>
      <link>https://community.cisco.com/t5/network-security/how-to-permit-only-opc-protocol-traffic-through-cisco-asa-5505/m-p/2597592#M205292</link>
      <description>&lt;P&gt;Hi murali438,&lt;/P&gt;&lt;P&gt;We have server with OPC server machine&amp;nbsp;then ASA 5505 then OPC client machine. Our security departament insists to permit only OPC traffic between OPC-server and OPC-client.&lt;/P&gt;&lt;P&gt;OPC protocol uses dinamic windows port range( winxp 1025-5000, vista+ 49192- 65535) and 135 port as endpoint mapper. It means that &amp;nbsp;after connection to server to 135 port endpoint mapper(at server)&amp;nbsp;chooses random port to&amp;nbsp;OPC communication iside of dinamic range and then server and client communicate&amp;nbsp;via that random port.Our security departament forbids just&amp;nbsp; to open this dinamic ranges on ASA 5505 because it's a big security hole.&amp;nbsp;Configuring server matchine to limit dinamic range does not work correctly.&amp;nbsp;Is there a way or built-in inspection(&amp;nbsp;I heard about DCEPRC, is that a&amp;nbsp;solution?)&amp;nbsp;to repmit only OPC traffic?&lt;/P&gt;</description>
      <pubDate>Fri, 14 Nov 2014 01:05:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-permit-only-opc-protocol-traffic-through-cisco-asa-5505/m-p/2597592#M205292</guid>
      <dc:creator>PelekhovIS</dc:creator>
      <dc:date>2014-11-14T01:05:39Z</dc:date>
    </item>
    <item>
      <title>According to my knowledge</title>
      <link>https://community.cisco.com/t5/network-security/how-to-permit-only-opc-protocol-traffic-through-cisco-asa-5505/m-p/2597593#M205293</link>
      <description>&lt;P&gt;According to my knowledge cisco asa can only inspect&amp;nbsp; below applications (i don't know about latest model but this is on 8.4). DCEPRC might be pefect solution for you but the catch is&lt;/P&gt;&lt;P&gt;"DCERPC inspection only supports communication between an EPM server and clients to open pinholes through the ASA. Clients using RPC communication that does not use an EPM server is not supported with DCERPC inspection"&lt;/P&gt;&lt;P&gt;And i'm afraid we can't create an inspection policy for custom applications.&lt;/P&gt;&lt;P&gt;ASA1(config-pmap-c)# inspect ?&lt;/P&gt;&lt;P&gt;mpf-policy-map-class mode commands/options:&lt;BR /&gt;&amp;nbsp; ctiqbe&lt;BR /&gt;&amp;nbsp; dcerpc&lt;BR /&gt;&amp;nbsp; dns&lt;BR /&gt;&amp;nbsp; esmtp&lt;BR /&gt;&amp;nbsp; ftp&lt;BR /&gt;&amp;nbsp; gtp&lt;BR /&gt;&amp;nbsp; h323&lt;BR /&gt;&amp;nbsp; http&lt;BR /&gt;&amp;nbsp; icmp&lt;BR /&gt;&amp;nbsp; ils&lt;BR /&gt;&amp;nbsp; im&lt;BR /&gt;&amp;nbsp; ip-options&lt;BR /&gt;&amp;nbsp; ipsec-pass-thru&lt;BR /&gt;&amp;nbsp; ipv6&lt;BR /&gt;&amp;nbsp; mgcp&lt;BR /&gt;&amp;nbsp; mmp&lt;BR /&gt;&amp;nbsp; netbios&lt;BR /&gt;&amp;nbsp; pptp&lt;BR /&gt;&amp;nbsp; rsh&lt;BR /&gt;&amp;nbsp; rtsp&lt;BR /&gt;&amp;nbsp; sip&lt;BR /&gt;&amp;nbsp; skinny&lt;BR /&gt;&amp;nbsp; snmp&lt;BR /&gt;&amp;nbsp; sqlnet&lt;BR /&gt;&amp;nbsp; sunrpc&lt;BR /&gt;&amp;nbsp; tftp&lt;BR /&gt;&amp;nbsp; waas&lt;BR /&gt;&amp;nbsp; xdmcp&lt;/P&gt;&lt;P&gt;This is how it works (excerpts from the link mentioned at the bottom)&lt;/P&gt;&lt;P class="pSF_StepFirst"&gt;&lt;B&gt;Step&amp;nbsp;1 &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" width="5" /&gt;A client queries an EPM server for the dynamically-allocated port number of a required DCERPC service. The EPM server listens on the well-known TCP port 135.&lt;/P&gt;&lt;P class="pSN_StepNext"&gt;&lt;B&gt;Step&amp;nbsp;2 &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" width="5" /&gt;The ASA, located between the client and EPM server, intercepts the communication.&lt;/P&gt;&lt;P class="pSN_StepNext"&gt;&lt;B&gt;Step&amp;nbsp;3 &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" width="5" /&gt;The EPM server indicates the port number on which the DCERPC service is available.&lt;/P&gt;&lt;P&gt;&lt;B&gt;Step&amp;nbsp;4 &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" width="5" /&gt;The ASA opens a pinhole for that DCERPC service&lt;/P&gt;&lt;P&gt;&lt;B&gt;Step&amp;nbsp;5 &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" width="5" /&gt;Using that pinhole, the client attempts to connect to the DCERPC service on the indicated port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="pSN_StepNext"&gt;&lt;B&gt;Step&amp;nbsp;6 &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" width="5" /&gt;The ASA detects that the connection is permitted and creates a secondary connection to the server instance providing the DCERPC service. When creating the secondary connection, the ASA applies NAT if necessary.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="pSN_StepNext"&gt;You might already have it but in case&lt;/P&gt;&lt;P class="pSN_StepNext"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/inspect_mgmt.html&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Nov 2014 03:39:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-permit-only-opc-protocol-traffic-through-cisco-asa-5505/m-p/2597593#M205293</guid>
      <dc:creator>Murali</dc:creator>
      <dc:date>2014-11-14T03:39:36Z</dc:date>
    </item>
    <item>
      <title>HiYou might want to look at</title>
      <link>https://community.cisco.com/t5/network-security/how-to-permit-only-opc-protocol-traffic-through-cisco-asa-5505/m-p/2597594#M205294</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;You might want to look at OPC Tunnellers. They are useful for getting around firewall issues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2014 02:32:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-permit-only-opc-protocol-traffic-through-cisco-asa-5505/m-p/2597594#M205294</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2014-11-20T02:32:02Z</dc:date>
    </item>
    <item>
      <title>Thanks a lot for your help.</title>
      <link>https://community.cisco.com/t5/network-security/how-to-permit-only-opc-protocol-traffic-through-cisco-asa-5505/m-p/2597595#M205295</link>
      <description>&lt;P&gt;Thanks a lot for your help.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Dec 2014 01:49:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-permit-only-opc-protocol-traffic-through-cisco-asa-5505/m-p/2597595#M205295</guid>
      <dc:creator>PelekhovIS</dc:creator>
      <dc:date>2014-12-10T01:49:28Z</dc:date>
    </item>
    <item>
      <title>your welcome ! Please mark</title>
      <link>https://community.cisco.com/t5/network-security/how-to-permit-only-opc-protocol-traffic-through-cisco-asa-5505/m-p/2597596#M205296</link>
      <description>&lt;P&gt;your welcome !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please mark the posts as correct / rate if it helped or solved your problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Murali&lt;/P&gt;</description>
      <pubDate>Wed, 10 Dec 2014 06:42:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-permit-only-opc-protocol-traffic-through-cisco-asa-5505/m-p/2597596#M205296</guid>
      <dc:creator>Murali</dc:creator>
      <dc:date>2014-12-10T06:42:56Z</dc:date>
    </item>
    <item>
      <title>Re: Thanks a lot for your help.</title>
      <link>https://community.cisco.com/t5/network-security/how-to-permit-only-opc-protocol-traffic-through-cisco-asa-5505/m-p/3197739#M205297</link>
      <description>&lt;P&gt;Hi, were you able to establish OPC DA, HDA, A&amp;amp;E with DCE RPC inspection?&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2017 14:05:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-permit-only-opc-protocol-traffic-through-cisco-asa-5505/m-p/3197739#M205297</guid>
      <dc:creator>QUARK TARO</dc:creator>
      <dc:date>2017-10-12T14:05:09Z</dc:date>
    </item>
  </channel>
</rss>

